PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
74b9505aefce9b9b5e02bc6eb31e0b44de771b4a3fd5c73edbb8c4870f56a7d2
Asterisk Project Security Advisory - AST-2012-008 previously dealt with a denial of service attack exploitable in the Skinny channel driver that occurred when certain messages are sent after a previously registered station sends an Off Hook message. Unresolved in that patch is an issue in the Asterisk 10 releases, wherein, if a Station Key Pad Button Message is processed after an Off Hook message, the channel driver will inappropriately dereference a Null pointer. Similar to AST-2012-008, a remote attacker with a valid SCCP ID can can use this vulnerability by closing a connection to the Asterisk server when a station is in the "Off Hook" call state and crash the server.
fd0d2c21399e574d3381cbf0d6fbf99a5bd73c0e0a594da8126262e1f90d0130
Mandriva Linux Security Advisory 2012-091 - An integer overflow vulnerability in the libreoffice graphic loading code could allow a remote attacker to cause a denial of service or potentially execute arbitrary code. An integer overflow flaw, leading to buffer overflow, was found in the way libreoffice processed invalid Escher graphics records length in PowerPoint documents. An attacker could provide a specially-crafted PowerPoint document that, when opened, would cause libreoffice to crash or, potentially, execute arbitrary code with the privileges of the user running libreoffice. libreoffice for Mandriva Linux 2011 has been upgraded to the 3.5.4 version which is not vulnerable to these issues.
b849c293b15ace9758097082f96c8354543795b86c3fe995af6842a3a1a9ca50
Cells Blog CMS version 1.1 suffers from remote SQL injection and cross site scripting vulnerabilities.
0effa93810aae7982a7ab048e47ddd1e8824aa56bd49be008f389b1d606b70ab
Jobs Portal version 3.0 suffers from remote SQL injection and cross site scripting vulnerabilities.
a99fcd0bd41bc6f9abd28a43cd0fd0e0ed3f34ede832e0246bf2c24b0f585df8
Nagios XI versions prior to 2011R3.0 suffer from a cross site scripting vulnerability.
ed44ced27d734522a50f9f7812924b931ced94c24e25b7da6c559b8342f5dc87
Simple Forum PHP version 2.1 suffers from multiple remote SQL injection vulnerabilities.
978cef328c0e2e191c9abf9210cb467e76ca8ebb5b1975c8eebb5db09da71a2d
Code Audit Labs has discovered that Opera versions 11.61 and below suffer from a website spoofing vulnerability.
50da669bf3824d6c802a70da8d221a4f3190ef60b1128133a28548f02da68d04
Swoopo Gold Shop CMS version 8.4.56 suffers from cross site scripting and remote SQL injection vulnerabilities.
ca3c7fc694c16b1331de0d9f7715b00b77d1f8d1d34b9d99df28c5349e38feb6
Mandriva Linux Security Advisory 2012-090 - An integer overflow vulnerability in the openoffice.org graphic loading code could allow a remote attacker to cause a denial of service or potentially execute arbitrary code. An integer overflow flaw, leading to buffer overflow, was found in the way openoffice.org processed invalid Escher graphics records length in PowerPoint documents. An attacker could provide a specially-crafted PowerPoint document that, when opened, would cause openoffice.org to crash or, potentially, execute arbitrary code with the privileges of the user running openoffice.org. The updated packages have been patched to correct this issue.
0ad71e285918b64c0c397f175db7374700a819eb6f38bdb934f39f35d2d36b21
Squirrelcart Cart Shop version 3.3.4 suffers from multiple cross site scripting vulnerabilities.
50dea74dd70cc3c135991dd6d629c7dd2c70fb45931dff7ab87b441a26c83978
Nuked Klan SP CMS version 4.5 suffers from a remote SQL injection vulnerability.
ebe08aea613afd901a49b1426f4352b085f990ac993f702cda6d8c06256333e2
This is a brief whitepaper that discusses various types of vulnerabilities found in web applications. It is written in Turkish.
8446334b51d3002cf9d002cb56e09e3d69279e97044d49eee38394c89659e221
This is a brief whitepaper that goes over web application source code analysis. It is written in Turkish.
ec3be7fcfab6dced156580a0b00c70470e3f6126135807f0a92b12ab22045feb
XM Easy Personal FTP Server version 5.30 and below remote format string write4 exploit with a connect back shell.
1c58ef6dea83e7940848c6463d66d3113944a2871d92175d52108a30c4cb9927
Interspire Shopping Cart version 6 suffers from multiple cross site scripting vulnerabilities.
758fb383c3e871e0c1f3c6f0061522f5eb1f8b5b4feed5f223ca53995240772d
This Metasploit module exploits the Wyse Rapport Hagent service and causes a remote power cycle.
22351b9d23464102ba3b26074487f1ff569c07be9c592ad7cff3d5dd6f17f981
This Metasploit module exploits the ComSndFTP FTP Server version 1.3.7 beta by sending a specially crafted format string specifier as a username. The crafted username is sent to to the server to overwrite the hardcoded function pointer from Ws2_32.dll!WSACleanup. Once this function pointer is triggered, the code bypasses dep and then repairs the pointer to execute arbitrary code. The SEH exit function is preferred so that the administrators are not left with an unhandled exception message. When using the meterpreter payload, the process will never die, allowing for continuous exploitation.
8ca8af4598071a83d2552f14b027f3fdb8f361c95b01bacf03d39857c306caea
iScripts EasyCreate CMS version 2.0 suffers from cross site scripting and remote SQL injection vulnerabilities.
cd334834f961f9172c566cda5af57c6372daceaf1de99dc982650b1577d4901c
This Metasploit module exploits a memory corruption flaw in Internet Explorer 8 when handling objects with the same ID property. At the moment this module targets IE8 over Windows XP SP3 through the heap massaging plus heap spray as exploited in the wild.
20f72fec96a5590b5bee38dc7ead6c6f34987bffcedca8f42c8054df4bedc309
This Metasploit module exploits a vulnerability found in Lattice Semiconductor PAC-Designer 6.21. As a .pac file, when supplying a long string of data to the 'value' field under the 'SymbolicSchematicData' tag, it is possible to cause a memory corruption on the stack, which results in arbitrary code execution under the context of the user.
4f39a6ba7a1c027c53d6c89df81d4f572dc43a0a4728c3bef5f6473a11849cc1
ADICO CMS version 1.1 suffers from a remote blind SQL injection vulnerability.
d32ff298c00331b9a474c38dbcb543a5a3bd70d634dcbba8e7b6e8def1327de4
qdPM version 7 suffers from a remote shell upload vulnerability.
de7d737317088da35d6c5415b3002cc2704e760c0485eed4b429a49321a72e9c
Debian Linux Security Advisory 2494-1 - It was discovered that ffmpeg, Debian's version of the libav media codec suite, contains vulnerabilities in the DPCM codecs (CVE-2011-3951), H.264 (CVE-2012-0851), ADPCM (CVE-2012-0852), and the KMVC decoder (CVE-2011-3952).
4501feb8273e9684718b44e670322a6446313c332368d2d5a2059638c53e4d2a
SPIP Core versions below and equal to 3.0.1, 2,1.14, and 2.0.19 suffer from a cross site scripting vulnerability in the administrative panel.
5f46f70dfcbb4a11ad71960db80676cb97a1e1a148304daa9c476926ffe35c25